Security Wednesdays #9 - Local Privilege Escalation - NUS Greyhats

Published on: Wednesday, 23 March 2016

Speaker: Paul Craig

Presentation Description:
Although “getting shell” is often the goal of any penetration tester, in reality that shell has low privileges with limited access to the local host or the real treasures it may hold. To truly become a master of your domain you must be able to become UID 0 or NT AUTHORITY\SYSTEM through a technique known as local privilege escalation.

This presentation will delve into the many methods of privilege escalation that exist in both Windows and Unix Systems and show you just how you can go from Hero to UID 0 in a flash.

Speaker's Biography:
Paul Craig leads the offensive security Penetration Testing team at Vantage Point, here in Sunny Singapore. Paul is an avid hacker with a passion for exploitation and has been hacking professionally for 13 years. Paul originally hails from New Zealand, the land of sheep.

Event Page: https://www.facebook.com/events/1019203218143738/

Produced by Engineers.SG

Help us caption & translate this video!

http://amara.org/v/IFa2/

Organization
Presenter